Re: One more 3Com SNMP vulnerability

1999-09-03 Thread Peter Hicks
Hi there I'm running version 3.17 firmware on the SSII Hub 10's here, and the securityUserTable is only visible if you use a read-write community string. Peter. - Original Message - From: Nerijus Krukauskas <[EMAIL PROTECTED]> To: <[EMAIL PROTECTED]> Sent: 30 August 1999 14:43 Subject:

Re: Local DoS in FreeBSD

1999-09-03 Thread MMS26
On Fri, 27 Aug 1999, L. Sassaman wrote: > > This was first posted to the FreeBSD security list on the 9th of August, > subsequently discussed on freebsd-stable and freebsd-hackers... no one > seems to care, even though it is able to lock up 2.2.6, 2.2.8, and 3.2.x > machines consistantly. I have

Re: ProFTPD 1.2.0pre4 available

1999-09-03 Thread Werner Koch
Malicious User <[EMAIL PROTECTED]> writes: > knock it around. I suspect this version will still fail on FreeBSD > (anyone care to offer up an account for me on a FreeBSD system to test Instead of using snprintf() you can you sprintf() and change the "%s" formats to (e.g.) "$%.30s" - somewhat m

Re: ProFTPD

1999-09-03 Thread pb
Hi, Note that user takes the value "user@host" given at password prompt for anonymous access (forgetting any potential dns attacks into remhost) This allows anyone to smash the stack just with an anonymous access and a file to download. (see last published exploits.) Regards, Pascal On Mon, Aug

Re: [Fwd: ISS Security Advisory: Buffer Overflow in Netscape Enterprise and FastTrack Web Servers]

1999-09-03 Thread Jason Axley
Just to keep y'all updated, and to summarize what's known so far: 1) The ISS advisory sucks (no details, didn't mention that it was NT-only or that Solaris wasn't vulnerable, they supposedly worked with Netscape on this, but don't have more specific info about which platforms/versions are vulnera

Re: Vixie Cron version 3.0pl1 vulnerable to root exploit

1999-09-03 Thread Valentin Nechayev
Martin Schulze <[EMAIL PROTECTED]> wrote: > Red Hat has recently released a Security Advisory (RHSA-1999:030-01) > covering a reverse denial of service bug in the vixie cron package. > As user you could restart sendmail even if the host should not receive > mail through the SMTP port. > > Further

Found This In My Little Sister's Bag

1999-09-03 Thread Fleur Marty
Elias sorry if you had this twice... /* ** code-sky-chocolate: flaoua ** keyboard handler: kalou. ** ** usage: nc -l -p 1509 & ** (./p welcome.msg 195,3,2,83,5,229 -100 1016 ; cat ) | nc host 21 ** ** tester avec buf == 1018, 1019, 1020, 1021 ** a cause de l'alignement hostname+chemin ~ftp+taille

Re: Root shell vixie cron exploit

1999-09-03 Thread Seva Gluschenko
Message from Michal Zalewski at Jul 5 14:20 in parts: MZ> For script kiddiez, here's an exploit for recent vixie-cron vulnerability, MZ> giving instant root shell. Thought it will help script kiddies, but as MZ> Martin Schulze included almost step-by-step guide how to abuse Sendmail MZ> flags

Re: RH 6.0 shadow passwords and locking users bug

1999-09-03 Thread bandregg
[root@sideshow /root]# rpm -q shadow-utils shadow-utils-980403-12 [root@sideshow /root]# rpm -q pam pam-0.66-18 Which are standard with 6.0 and I cannot reproduce this problem. On Mon, 30 Aug 1999 14:07:35 -0700, Prince Ctrl wrote: >Aleph, > >I do not know whether this has been reported to the l

SECURITY: RHSA-1999:033 Buffer overflow problem in the inews program

1999-09-03 Thread Cristian Gafton
-BEGIN PGP SIGNED MESSAGE- - - Red Hat, Inc. Security Advisory Synopsis: Buffer overflow problem in the inews program Advisory ID:RHSA-1999:033-01 Issue date: 199

Re: I found this today and iam reporting it to you first!!! (fwd)

1999-09-03 Thread blue0ne
There was a similar problem with SMAP on Gauntlet Firewalls a couple of years back. Only in that instance, it would eventually fill up the filesystem with logs, and the proxy service would fail. blue0ne -Original Message- From: Alfred Huger <[EMAIL PROTECTED]> To: [EMAIL PROTECTED] <[EM

Re: Stack Shield: defending from "stack smashing" attacks

1999-09-03 Thread Valdis . Kletnieks
On Tue, 31 Aug 1999 17:13:21 -, Crispin Cowan <[EMAIL PROTECTED]> said: > Tobias Haustein wrote: > > I was about to write a > > binary translator, that reads an executeable, locates every function > > prolog and epilog, adds the nescessary code to detect buffer > > overflows, and writes a new

Netscape communicator 4.06J, 4.5J-4.6J, 4.61e Buffer Overflow

1999-09-03 Thread DEF CON ZERO WINDOW
Hi, I discovered a buffer overflow bug which causes huge security hole on the `Netscape communicator 4.06J, 4.5J - 4.6J, 4.61e( probably, a version 3.0 after all )'. The problem of this application is in the handling of EMBED TAG, the buffer overflow is caused if the long string is specified

Netscape 4.x exploit code

1999-09-03 Thread DEF CON ZERO WINDOW
plz add this code. -- : R00t Zer0 - http://www.ugtop.com/defcon0/index.htm : : E-Mail: [EMAIL PROTECTED] : : -- -- : : "HP/UX is the worst OS for the hacker..." - Mark Abene : n

Re: Cisco and Nmap Dos

1999-09-03 Thread Lancashire, Andrew
Travis, Thanks for the response, we are running 11.2. I would also agree with the allocation of memory issues that you mention. One other note, it was told to me yesterday a 2500 series in the same time frame over 5 hops away had the same problem. Although this router has much less mem (4Meg)

Re: [Linux] glibc 2.1.x / wu-ftpd <=2.5 / BeroFTPD / lynx / vlock / mc / glibc 2.0.x

1999-09-03 Thread David Wagner
In article <[EMAIL PROTECTED]>, Norbert Warmuth <[EMAIL PROTECTED]> wrote: > An off-by-one error, hardly to exploit especially since the value written > is always '\0'. Relying on that to protect you may not be prudent. See http://www.geog.ubc.ca/snag/bugtraq/msg03213.html for an example of a

Re: Cisco and Nmap Dos

1999-09-03 Thread Travis Pugh
I just finished running CyberCop and nmap against a smaller range (192.168.0.0) on a cat 5500 w/RSM and didn't notice any memory issues on the RSM. Perhaps it is just the traffic generated by scanning the entire /8 at once. The Cisco engineer is correct about the small packet issue, though, as Cis

amd remote overflow - linux

1999-09-03 Thread duke
hi, i noticed a little while ago this bug redhat has pointed out and wrote a demonstration exploit.. its a bit lame but it works with no offset on redhat 4.2, 5.0, 5.1, 5.2, and 6.0.. enjoy! ;) exploit is attached.. -duke amdex.tgz